ME-MAC Protocol for MAC Layer in MANET to Overcome HET Problem
Creators
- 1. Professor, Department of Computer Science and Business System, Panimalar Engineering College, Chennai (Tamil Nadu), India.
Contributors
Contact person:
Researchers:
- 1. Professor, Department of Computer Science and Business System, Panimalar Engineering College, Chennai (Tamil Nadu), India.
- 2. PhD, DSc, Vice Chancellor and Professor, Manipur International University, Imphal, Manipur, India
- 3. CTO & amp, Dean Innovation, Manipur International University, Imphal, Manipur, India.
Description
Abstract: Medium Access layer in Mobile Adhoc Network is responsible of transmission of packet through the wireless medium, while transmitting the packet all nodes has to intellect the medium before sending the packet. Every node can able to transmit the packet when the medium if free otherwise the nodes have to wait until the medium becomes free. Some cases the transmission range of the node can be idle but due to Hidden and Exposed node, the node could not be sending the packet to other nodes. Node has to wait unnecessarily event the transmission medium is free. This research article proposed the Mutual Exclusion MAC protocol for avoiding hidden and exposed terminal problem in MANET. The proposed protocol is implemented with the support of Network simulator 3 and results are compared with the existing different protocol proposed for the MAC layer with the parameter and better results shown.
Files
B503404020224.pdf
Files
(477.2 kB)
Name | Size | Download all |
---|---|---|
md5:0898af0756fd974cb8a6abe4f2d7e3d4
|
477.2 kB | Preview Download |
Additional details
Identifiers
- EISSN
- 2582-760X
- DOI
- 10.54105/ijdcn.B5034.03040623
Dates
- Accepted
-
2023-06-15Manuscript received on 06 June 2023 | Revised Manuscript received on 10 June 2023 | Manuscript Accepted on 15 June 2023 | Manuscript published on 30 January 2024.
References
- R. Ramanathan and J. Redi, 9 (2002) "A Brief Overview of ad hoc networks: challenges and Directions," IEEE Commun. Mag., vol. 40, no. 5, May. 2002. https://doi.org/10.1109/MCOM.2002.1006968
- Dr. James A. ,Joseph P. Macker Freebersyser,Advanced Technology Office Defense Advanced Research Projects Agency, " Overview of CBMANET, ITMANET for WAND proposer Day meeting" Feb27, 2007
- Caishi Huang , Chin-Tau Lea , Albert Kai-Sun Wong (2012)," A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks" in ELSEVIER,17 June, 2012. https://doi.org/10.1016/j.comnet.2012.06.008
- Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri, (2010)"COMPARATIVE STUDY OF HIDDEN NODEPROBLEM AND SOLUTION USING DIFFERENT TECHNIQUES AND PROTOCOLS" JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151- 9617.
- Ms. Ritu Patidar, Prof. Dinesh Chandra Jain,(2012) " Solving the Hidden Terminal problems Using Directional-Antenna Based MAC Protocol for Wireless Adhoc Networks" ijarcsse, Volume 2, Issue 5, May 2012.
- CaiZ J Lu M, Wang X D. Channel access-based self-organized clustering in ad hoc networks. IEEETransactions on Mobile Computing 2003; 2(2): 102-113. https://doi.org/10.1109/TMC.2003.1217231
- Khaled H. Almotairi and Xuemin (Sherman) Shen, "Multichannel medium access control for adhoc wireless networks" WIRELESS COMMUNICATIONS AND MOBILE COMPUTING(2011). https://doi.org/10.1002/wcm.1159
- Ketema Adere, Rammurthy, "Solving the Hidden and Exposed Terminal problems Using Directional-Antenna Based MAC Protocol for Wireless Sensor Networks" 7th International Conference on Wireless and Optical Communication Networks, Colombo(2010). https://doi.org/10.1109/WOCN.2010.5587352
- Ki Hong Kim, Daejeon, Korea, "Security Attack based on Control Packet Vulnerability in Cooperative Wireless Networks" The Ninth International Conference on Networking and Services 2013.
- Caishi Huang , Chin-Tau Lea , Albert Kai-Sun Wong," A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks" in ELSEVIER,17 June, 2012. https://doi.org/10.1016/j.comnet.2012.06.008
- Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri, "COMPARATIVE STUDY OF HIDDEN NODEPROBLEM AND SOLUTION USING DIFFERENT TECHNIQUES AND PROTOCOLS" JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151- 9617.
- Chen J, Sheu S, Yang C. ( 2003) A new multichannel access protocol for IEEE 802.11 ad hoc wireless LANs.Proc IEEE PIMRC 2003. 2003; 2291-2296.
- J Garcia-Luna-Aceves Z. Tang, (1999) Hop- Reserva tion multiple access (HRMA) for Ad-hoc netw orks, in: Proceedings of the IEEE Infocom 1999.
- T. Safadawi and S. Xu , (2001) IEEE 802.11 MAC Protocol MAC Protocol work well in multihop WirelessAd-hoc networks, IEEE Communicati on maga-zine, pp. 130-137, June 2001. https://doi.org/10.1109/35.925681
- https://en.wikipedia.org/wiki/Venn_diagram.
- Madhuri, M. V., & Sangameswar, Dr. M. V. (2019). Encryption Technique to Optimize Information Leakage in Multi Cloud Storage Services. In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6s, pp. 1078–1081). https://doi.org/10.35940/ijeat.f1002.0886s19
- Thapar, S., & Sharma, S. K. (2020). Wormhole Attack Isolation Access from Mobile Ad hoc Network with Delay Prediction Method. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 6, pp. 3672–3680). https://doi.org/10.35940/ijrte.f8230.038620
- Khan, I., & Gite, Dr. P. (2022). Detecting Malicious Nodes in Mobile Ad hoc Networks - A Review. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 6, pp. 1–3). https://doi.org/10.35940/ijese.d2527.0510622
- Pramod, K., Mrs. Durga, M., Apurba, S., & Shashank, S. (2023). An Efficient LEACH Clustering Protocol to Enhance the QoS of WSN. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 3, Issue 3, pp. 1–8). https://doi.org/10.54105/ijainn.a3822.043323
- Hemalatha, Dr. S., Pallathadka, Dr. H., & Chinchewadi, Prof. R. P. (2023). Proposed Mutual Exclusion MAC Protocol for MANET to Overcome Hidden and Exposed Terminal Problem. In Indian Journal of Data Communication and Networking (Vol. 3, Issue 6, pp. 1–4). https://doi.org/10.54105/ijdcn.f4238.103623